Skip to main content

An AWS CloudFront distribution uses a deprecated version of SSL/TLS

SeverityExploitabilityProvidersCategories
HIGHLOWAWSNETWORK

Description

Outdated TLS policies (version 1.0 and 1.1) rely on insecure cipher suites (SHA-1 and MD5), and are subject to a range of well known attack. Note that TLS 1.0 and 1.1 have been deprecated on March 25, 2021.

Allowing such policies can allow attacker to break the encryption, decrypt the traffic, and perform man-in-the-middle attacks.

Impact

Potential data exposureVisible in logsUser interaction requiredPrivileges required
TrueFalseTrueFalse

Known vulnerabilities could be exploited with man-in-the-middle attacks and lead to data and credential leakage.

Remediation guidelines

The cloudfront minimum protocol version should be set to TLS v1.2 or above.

Note that this implies that the clients connecting to your endpoint must support TLS version 1.2 or above. Also, if the SSL certificate is the default CloudFront certificate, i.e the used domain is cloudfront.net (https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy), it won't be possible to set the minimum protocol version to TLS v1.2 or above. This policy should be ignored.

References

How can I help you ?